Search results for: Benjamin Wolf
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 195

Search results for: Benjamin Wolf

195 Key Determinants of Human-Wolf (Canis lupus) Conflict in Shabestar County's Villages of East Azerbaijan Province, Iran

Authors: Nader Habibzadeh

Abstract:

Developing effective and well-targeted conservation strategies is dependent upon fully understanding the complexities of the local situation. We attempted to discern the main likely wolf-human conflict contributing variables in households of Shabestar county’s villages. Data were collected through questions in 53 semi-structured interviews in 36 villages across Shabestar district in summer 2014. The results suggested that people who have reportedly suffered livestock depredation and who have alternative income sources to livestock, are likely to be particularly hostile toward wildlife. With rapid assessment of households using these few key variables we are able to identify likely conflict hotspots and target conflict resolution efforts in those villages. Based on these results, the most important initial strategies for reducing conflict would be reducing the number of livestock killed by wolf, increasing opportunities to generate income only from livestock holdings rather than alternative income sources.

Keywords: human-wildlife conflict, wolf (Canis lupus), Shabestar, Iran

Procedia PDF Downloads 270
194 Interstellar Mission to Wolf 359: Possibilities for the Future

Authors: Rajasekar Anand Thiyagarajan

Abstract:

One of the driving forces of mankind is the “le r`eve d'etoiles" or the “dream of stars", which has been the dynamo of our civilization. Since the beginning of the dawn of the civilization, mankind has looked upon the heavens with wonder and he has tried to understand the meaning of those twinkling lights. As human history has progressed, the understanding of those twinkling lights has progressed, as we now know a lot of information about stars. However, the dream of stars or the dream of reaching those stars always remains within the expectations of mankind. In fact, the needs of the civilization constantly drive for better knowledge and the capability of reaching those stars is one such way that knowledge and exultation can be achieved. This paper takes a futuristic case study of an interstellar mission to Wolf 359, which is approximately 8.3 light years away from us. In terms of galactic distances, 8.3 light years is not much, but as far as present space technology capabilities are concerned, it is next to impossible for us to reach those distances. Several studies have been conducted on various missions to Alpha Centauri and other nearby stars such as Barnard's star and Wolf 359. However, taking a more distant star such as Wolf 359 will help test the mankind's drive for interstellar exploration, as exotic means of travel are needed. This paper will take a futuristic case study of the event and various possibilities of space travel will be discussed in detail. Comprehensive tables and graphs will be given, which will depict the amount of time that will pass at each mode of travel and more importantly some idea on the cost in terms of energy as well as money will be discussed within today's context. In addition, prerequisites to an interstellar mission to Wolf 359 will be given in detail as well as a sample mission which will take place to that particular destination. Even though the possibility of such a mission is probably nonexistent for the 21st century, it is essential to do these exercises so that mankind's understanding of the universe will be increased. In addition, this paper hopes to establish some general guidelines for such an interstellar mission.

Keywords: wolf 359, interstellar mission, alpha centauri, core diameter, core length, reflector thickness enrichment, gas temperature, reflector temperature, power density, mass of the space craft, acceleration of the space craft, time expansion

Procedia PDF Downloads 383
193 Distribution and Population Status of Canis spp. Threats and Conservation in Lehri Nature Park, Salt Range, District Jhelum

Authors: Muhammad Saad, AzherBaig, Anwar Maqsood, Muhammad Waseem

Abstract:

The grey wolf has been ranked endangered and Asiatic jackal as near threatened in Pakistan. Scientific data on population and threats to these species are not available in Pakistan, which is required for their proper management and conservation. The present study was conducted to collect data on distribution range, population status and threats to both of these Canis species in Lehri Nature Park. The data were collected using direct observations and indirect signs in the field. The population of grey wolf and Asiatic jackal were scattered into pocket of the study area and its surroundings. The current population of grey wolf was estimated 06 individuals and that of Asiatic jackal 28 individuals in the study area. The present study showed that grey wolf and Asiatic jackal were distributed in the northern and southern part of the study area having dense vegetation cover of tress and shrub between the altitudes of 330 m and 515 m. The research finding revealed that the scrub forest is the most preferred habitat of both the species but due to anthropogenic pressure the scrub forest is under severe threat. The dominant trees species were Acacia modesta, Zizyphus nummularia, and Prosopis juliflora and shrubs species of Dodonea-viscosa, Calotropis procera and Adhatoda vasica. Urial is one of the natural prey species: their population is low due to a number of reasons and therefore the maximum dependence of the wolves was on the livestock of the local and nomadic shepherds. The main prey species in the livestock was goats and sheep. The interviews were conducted with the eye witnesses of wolf attacks including livestock being killed by 5-6 numbers of wolves in different hamlets in the study area. The killing rate of the livestock by the wolves was greater when the nomadic shepherds were present in the area and decreased when they left the area. Presence of nomadic shepherds and killing rate has relation with the shifting of the wolves from the study area. It is further concluded that the population of the grey wolf and Asiatic jackal has decreased over time due to less availability of the natural prey species and habitat destruction.

Keywords: wildlife ecology, population conservation, rehabilitation, conservation

Procedia PDF Downloads 471
192 ELD79-LGD2006 Transformation Techniques Implementation and Accuracy Comparison in Tripoli Area, Libya

Authors: Jamal A. Gledan, Othman A. Azzeidani

Abstract:

During the last decade, Libya established a new Geodetic Datum called Libyan Geodetic Datum 2006 (LGD 2006) by using GPS, whereas the ground traversing method was used to establish the last Libyan datum which was called the Europe Libyan Datum 79 (ELD79). The current research paper introduces ELD79 to LGD2006 coordinate transformation technique, the accurate comparison of transformation between multiple regression equations and the three-parameters model (Bursa-Wolf). The results had been obtained show that the overall accuracy of stepwise multi regression equations is better than that can be determined by using Bursa-Wolf transformation model.

Keywords: geodetic datum, horizontal control points, traditional similarity transformation model, unconventional transformation techniques

Procedia PDF Downloads 266
191 Livestock Depredation by Large Predators: Patterns, Perceptions and Implications for Conservation and Livelihoods in Karakoram Mountain Ranges

Authors: Muhammad Zafar Khan, Babar Khan, Muhammad Saeed Awan, Farida Begum

Abstract:

Livestock depredation has greater significance in pastoral societies like Himalaya-Karakoram-Hindu Kush mountain ranges. The dynamics of depredation by large predators (snow leopard and wolf) and its implications for conservation and livelihoods of local people was investigated by household surveys in Hushey valley of Central Karakoram National Park, Pakistan. We found that, during five years (2008-12) 90% of the households in the valley had lost their livestock to snow leopard and wolf, accounting for 4.3% of the total livestock holding per year. On average each household had to bear a loss of 0.8 livestock head per year, equivalent to Pak Rupees 9,853 (US$ 101), or 10% of the average annual cash income. Majority of the predation incidences occurred during late summer in alpine pastures, mostly at night when animals were not penned properly. The prey animals in most of the cases were females or young ones. Of the total predation incidences, 60% were attributed to snow leopard, 37% to wolf, while in 3% the predator was unknown. The fear of snow leopard is greater than that of wolf. As immediate response on predation, majority of the local people (64%, n=99) preferred to report the case to their village conservation committee, 32% had no response while only 1% tended to kill the predator. The perceived causes of predation were: poor guarding practices (77%); reduction in wild prey (13%) and livestock being the favourite food of predators (10%). The most preferred strategies for predator management, according to the respondents were improved and enhanced guarding of livestock (72%), followed by increasing wild prey (18%) and lethal control (10%). To strike a balance between predator populations and pastoral livelihoods, better animal husbandry practices should be promoted including: improved guarding through collective hiring of skilled shepherds; corral improvement and use of guard dogs.

Keywords: Panthera unica, Canis lupus, Karakoram, human-carnivore conflict, predation

Procedia PDF Downloads 225
190 Model Updating-Based Approach for Damage Prognosis in Frames via Modal Residual Force

Authors: Gholamreza Ghodrati Amiri, Mojtaba Jafarian Abyaneh, Ali Zare Hosseinzadeh

Abstract:

This paper presents an effective model updating strategy for damage localization and quantification in frames by defining damage detection problem as an optimization issue. A generalized version of the Modal Residual Force (MRF) is employed for presenting a new damage-sensitive cost function. Then, Grey Wolf Optimization (GWO) algorithm is utilized for solving suggested inverse problem and the global extremums are reported as damage detection results. The applicability of the presented method is investigated by studying different damage patterns on the benchmark problem of the IASC-ASCE, as well as a planar shear frame structure. The obtained results emphasize good performance of the method not only in free-noise cases, but also when the input data are contaminated with different levels of noises.

Keywords: frame, grey wolf optimization algorithm, modal residual force, structural damage detection

Procedia PDF Downloads 351
189 Investigating Data Normalization Techniques in Swarm Intelligence Forecasting for Energy Commodity Spot Price

Authors: Yuhanis Yusof, Zuriani Mustaffa, Siti Sakira Kamaruddin

Abstract:

Data mining is a fundamental technique in identifying patterns from large data sets. The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical. Prior to that, data are consolidated so that the resulting mining process may be more efficient. This study investigates the effect of different data normalization techniques, which are Min-max, Z-score, and decimal scaling, on Swarm-based forecasting models. Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC). Forecasting models are later developed to predict the daily spot price of crude oil and gasoline. Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max. Nevertheless, the GWO is more superior that ABC as its model generates the highest accuracy for both crude oil and gasoline price. Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.

Keywords: artificial bee colony, data normalization, forecasting, Grey Wolf optimizer

Procedia PDF Downloads 443
188 Interface Designer as Cultural Producer: A Dialectic Materialist Approach to the Role of Visual Designer in the Present Digital Era

Authors: Cagri Baris Kasap

Abstract:

In this study, how interface designers can be viewed as producers of culture in the current era will be interrogated from a critical theory perspective. Walter Benjamin was a German Jewish literary critical theorist who, during 1930s, was engaged in opposing and criticizing the Nazi use of art and media. ‘The Author as Producer’ is an essay that Benjamin has read at the Communist Institute for the Study of Fascism in Paris. In this article, Benjamin relates directly to the dialectics between base and superstructure and argues that authors, normally placed within the superstructure should consider how writing and publishing is production and directly related to the base. Through it, he discusses what it could mean to see author as producer of his own text, as a producer of writing, understood as an ideological construct that rests on the apparatus of production and distribution. So Benjamin concludes that the author must write in ways that relate to the conditions of production, he must do so in order to prepare his readers to become writers and even make this possible for them by engineering an ‘improved apparatus’ and must work toward turning consumers to producers and collaborators. In today’s world, it has become a leading business model within Web 2.0 services of multinational Internet technologies and culture industries like Amazon, Apple and Google, to transform readers, spectators, consumers or users into collaborators and co-producers through platforms such as Facebook, YouTube and Amazon’s CreateSpace Kindle Direct Publishing print-on-demand, e-book and publishing platforms. However, the way this transformation happens is tightly controlled and monitored by combinations of software and hardware. In these global-market monopolies, it has become increasingly difficult to get insight into how one’s writing and collaboration is used, captured, and capitalized as a user of Facebook or Google. In the lens of this study, it could be argued that this criticism could very well be considered by digital producers or even by the mass of collaborators in contemporary social networking software. How do software and design incorporate users and their collaboration? Are they truly empowered, are they put in a position where they are able to understand the apparatus and how their collaboration is part of it? Or has the apparatus become a means against the producers? Thus, when using corporate systems like Google and Facebook, iPhone and Kindle without any control over the means of production, which is closed off by opaque interfaces and licenses that limit our rights of use and ownership, we are already the collaborators that Benjamin calls for. For example, the iPhone and the Kindle combine a specific use of technology to distribute the relations between the ‘authors’ and the ‘prodUsers’ in ways that secure their monopolistic business models by limiting the potential of the technology.

Keywords: interface designer, cultural producer, Walter Benjamin, materialist aesthetics, dialectical thinking

Procedia PDF Downloads 110
187 Extensions of Schwarz Lemma in the Half-Plane

Authors: Nicolae Pascu

Abstract:

Aside from being a fundamental tool in Complex analysis, Schwarz Lemma-which was finalized in its most complete form at the beginning of the last century-generated an important area of research in various fields of mathematics, which continues to advance even today. We present some properties of analytic functions in the half-plane which satisfy the conditions of the classical Schwarz Lemma (Carathéodory functions) and obtain a generalization of the well-known Aleksandrov-Sobolev Lemma for analytic functions in the half-plane (the correspondent of Schwarz-Pick Lemma from the unit disk). Using this Schwarz-type lemma, we obtain a characterization for the entire class of Carathéodory functions, which might be of independent interest. We prove two monotonicity properties for Carathéodory functions that do not depend upon their normalization at infinity (the hydrodynamic normalization). The method is based on conformal mapping arguments for analytic functions in the half-plane satisfying appropriate conditions, in the spirit of Schwarz lemma. According to the research findings in this paper, our main results give estimates for the modulus and the argument for the entire class of Carathéodory functions. As applications, we give several extensions of Julia-Wolf-Carathéodory Lemma in a half-strip and show that our results are sharp.

Keywords: schwarz lemma, Julia-wolf-caratéodory lemma, analytic function, normalization condition, caratéodory function

Procedia PDF Downloads 155
186 Parallel Gripper Modelling and Design Optimization Using Multi-Objective Grey Wolf Optimizer

Authors: Golak Bihari Mahanta, Bibhuti Bhusan Biswal, B. B. V. L. Deepak, Amruta Rout, Gunji Balamurali

Abstract:

Robots are widely used in the manufacturing industry for rapid production with higher accuracy and precision. With the help of End-of-Arm Tools (EOATs), robots are interacting with the environment. Robotic grippers are such EOATs which help to grasp the object in an automation system for improving the efficiency. As the robotic gripper directly influence the quality of the product due to the contact between the gripper surface and the object to be grasped, it is necessary to design and optimize the gripper mechanism configuration. In this study, geometric and kinematic modeling of the parallel gripper is proposed. Grey wolf optimizer algorithm is introduced for solving the proposed multiobjective gripper optimization problem. Two objective functions developed from the geometric and kinematic modeling along with several nonlinear constraints of the proposed gripper mechanism is used to optimize the design variables of the systems. Finally, the proposed methodology compared with a previously proposed method such as Teaching Learning Based Optimization (TLBO) algorithm, NSGA II, MODE and it was seen that the proposed method is more efficient compared to the earlier proposed methodology.

Keywords: gripper optimization, metaheuristics, , teaching learning based algorithm, multi-objective optimization, optimal gripper design

Procedia PDF Downloads 155
185 Grey Wolf Optimization Technique for Predictive Analysis of Products in E-Commerce: An Adaptive Approach

Authors: Shital Suresh Borse, Vijayalaxmi Kadroli

Abstract:

E-commerce industries nowadays implement the latest AI, ML Techniques to improve their own performance and prediction accuracy. This helps to gain a huge profit from the online market. Ant Colony Optimization, Genetic algorithm, Particle Swarm Optimization, Neural Network & GWO help many e-commerce industries for up-gradation of their predictive performance. These algorithms are providing optimum results in various applications, such as stock price prediction, prediction of drug-target interaction & user ratings of similar products in e-commerce sites, etc. In this study, customer reviews will play an important role in prediction analysis. People showing much interest in buying a lot of services& products suggested by other customers. This ultimately increases net profit. In this work, a convolution neural network (CNN) is proposed which further is useful to optimize the prediction accuracy of an e-commerce website. This method shows that CNN is used to optimize hyperparameters of GWO algorithm using an appropriate coding scheme. Accurate model results are verified by comparing them to PSO results whose hyperparameters have been optimized by CNN in Amazon's customer review dataset. Here, experimental outcome proves that this proposed system using the GWO algorithm achieves superior execution in terms of accuracy, precision, recovery, etc. in prediction analysis compared to the existing systems.

Keywords: prediction analysis, e-commerce, machine learning, grey wolf optimization, particle swarm optimization, CNN

Procedia PDF Downloads 81
184 Carl Schmitt in the Age of Immanence: A Critical Reading

Authors: Manuel Iretzberger

Abstract:

This paper aims to uncover the ideological aspects in the political thought of Carl Schmitt, who is enjoying an ever-increasing popularity in various academic fields, following in the wake of rising interest in questions of sovereignty and legitimacy. Given Schmitt’s biography, i.e. his role as the ‘Crown Jurist of the Third Reich’ (Gurian), an extraordinarily thorough examination is necessary; however, instead of merely ‘deconstructing’ his works, certain ontological truths he might have attained, shall be taken seriously. To this end, his notions of politics and the state of exception are scrutinized, which are indeed considered intriguing, yet prove to be enigmatic and impalpable at the core when read closely. In order to explain this conjuncture, both Schmitt’s philosophy of history and his ‘secret discussion’ (Agamben) with Walter Benjamin are depicted. As it turns out – it is argued – his concept of the Political has to be conceived of as embedded in a much broader context: In a post-transcendental, immanent age, he regards traditional modes of representation as no longer feasible and clings to authoritarianism as a surrogate – his Catholicism plays a decisive role here, forcing him to inject normatively biased assumptions into his political writings. Seeing Schmitt perform ‘rearguard action’ not only serves to disarm his work of most of its menacing aura, it also allows drawing conclusions about ways of legitimatizing democratic rule in modern times, as the paper tries to outline in its last section.

Keywords: Benjamin, history, immanence, Schmitt, sovereignty

Procedia PDF Downloads 264
183 Environmental Conditions Simulation Device for Evaluating Fungal Growth on Wooden Surfaces

Authors: Riccardo Cacciotti, Jiri Frankl, Benjamin Wolf, Michael Machacek

Abstract:

Moisture fluctuations govern the occurrence of fungi-related problems in buildings, which may impose significant health risks for users and even lead to structural failures. Several numerical engineering models attempt to capture the complexity of mold growth on building materials. From real life observations, in cases with suppressed daily variations of boundary conditions, e.g. in crawlspaces, mold growth model predictions well correspond with the observed mold growth. On the other hand, in cases with substantial diurnal variations of boundary conditions, e.g. in the ventilated cavity of a cold flat roof, mold growth predicted by the models is significantly overestimated. This study, founded by the Grant Agency of the Czech Republic (GAČR 20-12941S), aims at gaining a better understanding of mold growth behavior on solid wood, under varying boundary conditions. In particular, the experimental investigation focuses on the response of mold to changing conditions in the boundary layer and its influence on heat and moisture transfer across the surface. The main results include the design and construction at the facilities of ITAM (Prague, Czech Republic) of an innovative device allowing for the simulation of changing environmental conditions in buildings. It consists of a square section closed circuit with rough dimensions 200 × 180 cm and cross section roughly 30 × 30 cm. The circuit is thermally insulated and equipped with an electric fan to control air flow inside the tunnel, a heat and humidity exchange unit to control the internal RH and variations in temperature. Several measuring points, including an anemometer, temperature and humidity sensor, a loading cell in the test section for recording mass changes, are provided to monitor the variations of parameters during the experiments. The research is ongoing and it is expected to provide the final results of the experimental investigation at the end of 2022.

Keywords: moisture, mold growth, testing, wood

Procedia PDF Downloads 99
182 Local Directional Encoded Derivative Binary Pattern Based Coral Image Classification Using Weighted Distance Gray Wolf Optimization Algorithm

Authors: Annalakshmi G., Sakthivel Murugan S.

Abstract:

This paper presents a local directional encoded derivative binary pattern (LDEDBP) feature extraction method that can be applied for the classification of submarine coral reef images. The classification of coral reef images using texture features is difficult due to the dissimilarities in class samples. In coral reef image classification, texture features are extracted using the proposed method called local directional encoded derivative binary pattern (LDEDBP). The proposed approach extracts the complete structural arrangement of the local region using local binary batten (LBP) and also extracts the edge information using local directional pattern (LDP) from the edge response available in a particular region, thereby achieving extra discriminative feature value. Typically the LDP extracts the edge details in all eight directions. The process of integrating edge responses along with the local binary pattern achieves a more robust texture descriptor than the other descriptors used in texture feature extraction methods. Finally, the proposed technique is applied to an extreme learning machine (ELM) method with a meta-heuristic algorithm known as weighted distance grey wolf optimizer (GWO) to optimize the input weight and biases of single-hidden-layer feed-forward neural networks (SLFN). In the empirical results, ELM-WDGWO demonstrated their better performance in terms of accuracy on all coral datasets, namely RSMAS, EILAT, EILAT2, and MLC, compared with other state-of-the-art algorithms. The proposed method achieves the highest overall classification accuracy of 94% compared to the other state of art methods.

Keywords: feature extraction, local directional pattern, ELM classifier, GWO optimization

Procedia PDF Downloads 132
181 Battery Grading Algorithm in 2nd-Life Repurposing LI-Ion Battery System

Authors: Ya L. V., Benjamin Ong Wei Lin, Wanli Niu, Benjamin Seah Chin Tat

Abstract:

This article introduces a methodology that improves reliability and cyclability of 2nd-life Li-ion battery system repurposed as an energy storage system (ESS). Most of the 2nd-life retired battery systems in the market have module/pack-level state-of-health (SOH) indicator, which is utilized for guiding appropriate depth-of-discharge (DOD) in the application of ESS. Due to the lack of cell-level SOH indication, the different degrading behaviors among various cells cannot be identified upon reaching retired status; in the end, considering end-of-life (EOL) loss and pack-level DOD, the repurposed ESS has to be oversized by > 1.5 times to complement the application requirement of reliability and cyclability. This proposed battery grading algorithm, using non-invasive methodology, is able to detect outlier cells based on historical voltage data and calculate cell-level historical maximum temperature data using semi-analytic methodology. In this way, the individual battery cell in the 2nd-life battery system can be graded in terms of SOH on basis of the historical voltage fluctuation and estimated historical maximum temperature variation. These grades will have corresponding DOD grades in the application of the repurposed ESS to enhance system reliability and cyclability. In all, this introduced battery grading algorithm is non-invasive, compatible with all kinds of retired Li-ion battery systems which lack of cell-level SOH indication, as well as potentially being embedded into battery management software for preventive maintenance and real-time cyclability optimization.

Keywords: battery grading algorithm, 2nd-life repurposing battery system, semi-analytic methodology, reliability and cyclability

Procedia PDF Downloads 164
180 Attitudes Towards the Supernatural in Benjamin Britten’s The Turn of the Screw

Authors: Yaou Zhang

Abstract:

Background: Relatively little scholarly attention has been paid to the production of Benjamin Britten’s chamber opera The Turn of the Screw. As one of Britten’s most remarkable operas. The story of the libretto was from Henry James’s novella of the same name. The novella was created in 1898 and one of the primary questions addressed to people in the story is “how real the ghosts are,” which leads the story to a huge ambiguity in readers’ minds. Aims: This research focuses on the experience of seeing the opera on stage over several decades. This study of opera productions over time not only provides insight into how stage performances can alter audience members' perceptions of the opera in the present but also reveals a landscape of shifting aesthetics and receptions. Methods: To examine the hypotheses in interpretation and reception, the qualitative analysis is used to examine the figures of ghosts in different productions across the time from 1954 to 2021 in the UK: by accessing recordings, newspapers, and reviews for the productions that are sourced from online and physical archives. For instance, the field research is conducted on the topic by arranging interviews with the creative team and visiting Opera North in Leeds and Britten-Pears Foundation. The collected data reveals the “hidden identity” in creative teams’ interpretations, social preferences, and rediscover that have previously remained unseen. Results: This research presents an angle of Britten’s Screw by using the third position; it shows how the attention moved from the stage of “do the ghosts really exist” to “traumatised children.” Discussion: Critics and audiences have debated whether the governess hallucinates the ghosts in the opera for decades. While, in recent years, directors of new productions have given themselves the opportunity to go deeper into Britten's musical structure and offer the opera more space to be interpreted, rather than debating if "ghosts actually exist" or "the psychological problems of the governess." One can consider and reflect that the questionable actions of the children are because they are suffering from trauma, whether the trauma comes from the ghosts, the hallucinating governess, or some prior experiences: various interpretations cause one result that children are the recipients of trauma. Arguably, the role of the supernatural is neither simply one of the elements of a ghost story nor simply one of the parts of the ambiguity between the supernatural and the hallucination of the governess; rather, the ghosts and the hallucinating governess can exist at the same time - the combination of the supernatural’s and the governess’s behaviours on stage generates a sharper and more serious angle that draws our attention to the traumatized children.

Keywords: benjamin britten, chamber opera, production, reception, staging, the turn of the screw

Procedia PDF Downloads 69
179 Classical Music Unplugged: The Future of Classical Music Performance: Tradition, Technology, and Audience Engagement

Authors: Orit Wolf

Abstract:

Classical music performance is undergoing a profound transformation, marked by a confluence of technological advancements and evolving cultural dynamics. This academic paper explores the multifaceted changes and challenges faced by classical music performance, considering the impact of artificial intelligence (AI) along with other vital factors shaping this evolution. In the contemporary era, classical music is experiencing shifts in performance practices. This paper delves into these changes, emphasizing the need for adaptability within the classical music world. From repertoire selection and concert formats to artistic expression, performers and institutions navigate a delicate balance between tradition and innovation. We explore how these changes impact the authenticity and vitality of classical music performances. Furthermore, the influence of AI in the classical music concert world cannot be underestimated. AI technologies are making inroads into various aspects, from composition assistance to rehearsal and live performances. This paper examines the transformative effects of AI, considering how it enhances precision, adaptability, and creative exploration for musicians. We explore the implications for composers, performers, and the overall concert experience while addressing ethical concerns and creative opportunities. In addition to AI, there is the importance of cross-genre interactions within the classical music sphere. Mash-ups and collaborations with artists from diverse musical backgrounds are redefining the boundaries of classical music and creating works that resonate with a wider and more diverse audience. The benefits of cross-pollination in classical music seem crucial, offering a fresh perspective to listeners. As an active concert artist, Orit Wolf will share how the expectations of classical music audiences are evolving. Modern concertgoers seek not only exceptional musical performances but also immersive experiences that may involve technology, multimedia, and interactive elements. This paper examines how classical musicians and institutions are adapting to these changing expectations, using technology and innovative concert formats to deliver a unique and enriched experience to their audiences. As these changes and challenges reshape the classical music world, the need for a harmonious coexistence of tradition, technology, and innovation becomes evident. Musicians, composers, and institutions are striving to find a balance that ensures classical music remains relevant in a rapidly changing cultural landscape while maintaining the value it brings to compositions and audiences. This paper, therefore, aims to explore the evolving trends in classical music performance. It considers the influence of AI as one element within the broader context of change, highlighting the necessity of adaptability, cross-genre interactions, and a response to evolving audience expectations. By doing so, the classical music world can navigate this transformative period while preserving its timeless traditions and adding value to both performers and listeners. Orit Wolf, an international concert pianist, fulfils her vision to bring this music in new ways to mass audiences and will share her personal and professional experience as an artist who goes on stage and makes disruptive concerts.

Keywords: cross culture collaboration, music performance and ai, classical music in the digital age, classical concerts, innovation and technology, performance innovation, audience engagement in classical concerts

Procedia PDF Downloads 29
178 Constellating Images: Bilderatlases as a Tool to Develop Criticality towards Visual Culture

Authors: Quirijn Menken

Abstract:

Menken, Q. Author  Constellating Images Abstract—We live in a predominantly visual era. Vastly expanded quantities of imagery influence us on a daily basis, in contrast to earlier days where the textual prevailed. The increasing producing and reproducing of images continuously compete for our attention. As such, how we perceive images and in what way images are framed or mediate our beliefs, has become of even greater importance than ever before. Especially in art education a critical awareness and approach of images as part of visual culture is of utmost importance. The Bilderatlas operates as a mediation, and offers new Ways of Seeing and knowing. It is mainly known as result of the ground-breaking work of the cultural theorist Aby Warburg, who intended to present an art history without words. His Mnemosyne Bilderatlas shows how the arrangement of images - and the interstices between them, offers new perspectives and ways of seeing. The Atlas as a medium to critically address Visual Culture is also practiced by the German artist Gerhard Richter, and it is in written form used in the Passagen Werk of Walter Benjamin. In order to examine the use of the Bilderatlas as a tool in art education, several experiments with art students have been conducted. These experiments have lead to an exploration of different Pedagogies, which help to offer new perspectives and trajectories of learning. To use the Bilderatlas as a tool to develop criticality towards Visual Culture, I developed and tested a new pedagogy; a Pedagogy of Difference and Repetition, based on the philosophy of Gilles Deleuze. Furthermore, in offering a new pedagogy - based on the rhizomatic work of Gilles Deleuze – the Bilderatlas as a tool to develop criticality has found a firm basis. Keywords—Art Education, Walter Benjamin, Bilderatlas, Gilles Deleuze, Difference and Repetition, Pedagogy, Rhizomes, Visual Culture,

Keywords: Art Education, Bilderatlas, Pedagogy, Aby Warburg

Procedia PDF Downloads 127
177 Rewriting the 'Sick Man' History: Imagining Chinese Masculinity in the Contemporary Military Action Genre

Authors: Yongde Dai

Abstract:

The recent Chinese military action blockbusters, notably known as, Wolf Warrior/Zhan Lang (2015), Operation Mekong/Mei gong he xing dong (2016), Warrior 2/Zhan Lang 2 (2017) and Operation Red Sea/Hong hai xing dong (2018), have achieved phenomenal box-office successes and in particular, Wolf Warrior 2 became China’s highest-grossing film of all time. However, their yearly presence tends to show a paradigmic shift from China’s primacy of wen manliness (soft) to wu masculinity (hard). With the increasing cinematic exposure of a more muscular image manifesting in both the Chinese heroic soldiers and China itself as a rising global power, the backlash of the Chinese public against the proliferation of the feminized masculinity influenced by the ‘pretty-boy’ pop-culture and China’s harder approach to the current Sino-US tensions have correspondingly emerged and continued to brew. Chinese masculinity imagined in these films is one of the key factors that enable a gendered interpretation of the correlation between the Chinese on-screen fantasy and off-screen reality, that is, China’s public and official discourse about the hegemonic masculinity and non-hegemonic masculinity as well as China’s international profile on cinematic appearance and in today’s Sino-US relation. By reading closely at the four megahits as visual-audio texts with Chinese masculinity studies by Kam Louie and Geng Song, this paper attempts to examine the Chinese construction of manliness with historical accounts and argue why and how the recurrent emphasis of hard/military masculinity (wu) on screen are viewed as China’s contemporary rewriting of the ‘sick-man’ history in the film form. Through this investigation, the paper finds that the rewriting of the ‘sick-man’ history in the cinematic world through heroic brawny soldiers comes to resonate a collective anxiety of China in countering the real-life increasing feminized masculinity on the public appearance, particularly on the male celebrities. In addition, the superpower fantasy about China illuminates a hypermasculine imaginary of China as a global rising power and this coincidently echoes China’s current tougher diplomatic strategy tackling the Sino-US trade war, South China sea dispute and Huawei-US lawsuits.

Keywords: Chinese masculinity, Chinese military action film, feminized masculinity, manhood and nationhood, sick man of Asia

Procedia PDF Downloads 112
176 The Use of Artificial Intelligence in Digital Forensics and Incident Response in a Constrained Environment

Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane

Abstract:

Digital investigators often have a hard time spotting evidence in digital information. It has become hard to determine which source of proof relates to a specific investigation. A growing concern is that the various processes, technology, and specific procedures used in the digital investigation are not keeping up with criminal developments. Therefore, criminals are taking advantage of these weaknesses to commit further crimes. In digital forensics investigations, artificial intelligence is invaluable in identifying crime. It has been observed that an algorithm based on artificial intelligence (AI) is highly effective in detecting risks, preventing criminal activity, and forecasting illegal activity. Providing objective data and conducting an assessment is the goal of digital forensics and digital investigation, which will assist in developing a plausible theory that can be presented as evidence in court. Researchers and other authorities have used the available data as evidence in court to convict a person. This research paper aims at developing a multiagent framework for digital investigations using specific intelligent software agents (ISA). The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. A criminal investigation is classified quickly and efficiently using the case-based reasoning (CBR) technique. The MADIK is implemented using the Java Agent Development Framework and implemented using Eclipse, Postgres repository, and a rule engine for agent reasoning. The proposed framework was tested using the Lone Wolf image files and datasets. Experiments were conducted using various sets of ISA and VMs. There was a significant reduction in the time taken for the Hash Set Agent to execute. As a result of loading the agents, 5 percent of the time was lost, as the File Path Agent prescribed deleting 1,510, while the Timeline Agent found multiple executable files. In comparison, the integrity check carried out on the Lone Wolf image file using a digital forensic tool kit took approximately 48 minutes (2,880 ms), whereas the MADIK framework accomplished this in 16 minutes (960 ms). The framework is integrated with Python, allowing for further integration of other digital forensic tools, such as AccessData Forensic Toolkit (FTK), Wireshark, Volatility, and Scapy.

Keywords: artificial intelligence, computer science, criminal investigation, digital forensics

Procedia PDF Downloads 175
175 Primes as Sums and Differences of Two Binomial Coefficients and Two Powersums

Authors: Benjamin Lee Warren

Abstract:

Many problems exist in additive number theory which is essential to determine the primes that are the sum of two elements from a given single-variable polynomial sequence, and most of them are unattackable in the present day. Here, we determine solutions for this problem to a few certain sequences (certain binomial coefficients and power sums) using only elementary algebra and some algebraic factoring methods (as well as Euclid’s Lemma and Faulhaber’s Formula). In particular, we show that there are finitely many primes as sums of two of these types of elements. Several cases are fully illustrated, and bounds are presented for the cases not fully illustrated.

Keywords: binomial coefficients, power sums, primes, algebra

Procedia PDF Downloads 61
174 Optics Meets Microfluidics for Highly Sensitive Force Sensing

Authors: Iliya Dimitrov Stoev, Benjamin Seelbinder, Elena Erben, Nicola Maghelli, Moritz Kreysing

Abstract:

Despite the revolutionizing impact of optical tweezers in materials science and cell biology up to the present date, trapping has so far extensively relied on specific material properties of the probe and local heating has limited applications related to investigating dynamic processes within living systems. To overcome these limitations while maintaining high sensitivity, here we present a new optofluidic approach that can be used to gently trap microscopic particles and measure femtoNewton forces in a contact-free manner and with thermally limited precision.

Keywords: optofluidics, force measurements, microrheology, FLUCS, thermoviscous flows

Procedia PDF Downloads 140
173 Mechanical Characterization of Banana by Inverse Analysis Method Combined with Indentation Test

Authors: Juan F. P. Ramírez, Jésica A. L. Isaza, Benjamín A. Rojano

Abstract:

This study proposes a novel use of a method to determine the mechanical properties of fruits by the use of the indentation tests. The method combines experimental results with a numerical finite elements model. The results presented correspond to a simplified numerical modeling of banana. The banana was assumed as one-layer material with an isotropic linear elastic mechanical behavior, the Young’s modulus found is 0.3Mpa. The method will be extended to multilayer models in further studies.

Keywords: finite element method, fruits, inverse analysis, mechanical properties

Procedia PDF Downloads 318
172 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 275
171 Antioxidant Capacity of Different Broccoli Cultivars at Various Harvesting Dates

Authors: S. Graeff-Hönninger, J. Pfenning, V. Gutsal, S. Wolf, S. Zikeli, W. Claupein

Abstract:

Broccoli is considered as being a rich source of AOX like flavonoids, polyphenols, anthocyanins etc. and of major interest especially in the organic sector. However, AOX is environment dependent and often varies between cultivars. Aim of the study was to investigate the impact of cultivar and harvest date on AOX in broccoli. Activity of the AOX was determined using a Photochem®-Analyzer and a kit of reagent solutions for analysis. Results of the study showed that the lipid (ACL) and water-soluble antioxidant potential (AWC) of broccoli heads varied significantly between the four harvesting dates, but not among the different cultivars. The highest concentration of ACL was measured in broccoli heads harvested in September 2011, followed by heads harvested at the beginning of July in 2012. ACW was highest in heads harvested in October 2011. Lowest concentrations of ACW were measured in heads harvested in June 2012. Overall, the study indicated that the harvest date and thus growing conditions seem to be of high importance for final antioxidant capacity of broccoli.

Keywords: broccoli, open-pollinating, harvest date, epidemiological studies

Procedia PDF Downloads 396
170 Comparative Studies of Modified Clay/Polyaniline Nanocomposites

Authors: Fatima Zohra Zeggai, Benjamin Carbonnier, Aïcha Hachemaoui, Ahmed Yahiaoui, Samia Mahouche-Chergui, Zakaria Salmi

Abstract:

A series of polyaniline (PANI)/modified Montmorillonite (MMT) Clay nanocomposite materials have been successfully prepared by In-Situ polymerization in the presence of modified MMT-Clay or Diazonium-MMT-Clay. The obtained nanocomposites were characterized and compared by various physicochemical techniques. The presence of physicochemical interaction, probably hydrogen bonding, between clay and polyaniline, which was confirmed by FTIR, UV-Vis Spectroscopy. The electrical conductivity of neat PANI and a series of the obtained nanocomposites were also studied by cyclic voltammograms.

Keywords: polyaniline, clay, nanocomposites, in-situ polymerization, polymers conductors, diazonium salt

Procedia PDF Downloads 434
169 A Correlational Study: Dark Triad and Self-Restraint among Criminology Students

Authors: Mary Heather Lee T. Walker, Audilon Benjamin Madamba, Mizheal Vstrechnny Vidal, Rogelio Angeles, John Rhey Banag, Lorraine Martin

Abstract:

Criminology students are the future police officers of the country that plays a major role in protecting the citizens. Their behavior must be thoroughly assessed before given a badge of responsibility. Therefore, it is important to highlight their Dark Triad that is composed of Machiavellianism, Narcissism, and Psychopathy which are considered to be controversial variables in the present while self-restraint is considered to be their way of controlling themselves especially in their line of work. The researchers used convenience and random sampling and found the respondents from a private school. Thus, the study’s aim is to determine whether there is a relationship among these variables. Machiavellianism and Psychopathy is linked to Self-Restraint except Narcissism. There are lots of factors that resulted into this.

Keywords: criminology, dark triad, self-restraint, students

Procedia PDF Downloads 247
168 Closest Possible Neighbor of a Different Class: Explaining a Model Using a Neighbor Migrating Generator

Authors: Hassan Eshkiki, Benjamin Mora

Abstract:

The Neighbor Migrating Generator is a simple and efficient approach to finding the closest potential neighbor(s) with a different label for a given instance and so without the need to calibrate any kernel settings at all. This allows determining and explaining the most important features that will influence an AI model. It can be used to either migrate a specific sample to the class decision boundary of the original model within a close neighborhood of that sample or identify global features that can help localising neighbor classes. The proposed technique works by minimizing a loss function that is divided into two components which are independently weighted according to three parameters α, β, and ω, α being self-adjusting. Results show that this approach is superior to past techniques when detecting the smallest changes in the feature space and may also point out issues in models like over-fitting.

Keywords: explainable AI, EX AI, feature importance, counterfactual explanations

Procedia PDF Downloads 114
167 Minimum Pension Guarantee in Funded Pension Schemes: Theoretical Model and Global Implementation

Authors: Ishay Wolf

Abstract:

In this study, the financial position of pension actors in the market during the pension system transition toward a more funded capitalized scheme is explored, mainly via an option benefit model. This is enabled by not considering the economy as a single earning cohort. We analytically demonstrate a socio-economic anomaly in the funded pension system, which is in favor of high earning cohorts on at the expense of low earning cohorts. This anomaly is realized by a lack of insurance and exposure to financial and systemic risks. Furthermore, the anomaly might lead to pension re-reform back to unfunded scheme, mostly due to political pressure. We find that a minimum pension guarantee is a rebalance mechanism to this anomaly, which increases the probability to of the sustainable pension scheme. Specifically, we argue that implementing the guarantee with an intra-generational, risk-sharing mechanism is the most efficient way to reduce the effect of this abnormality. Moreover, we exhibit the convergence process toward implementing minimum pension guarantee in many countries which have capitalized their pension systems during the last three decades, particularly among Latin America and CEE countries.

Keywords: benefits, pension scheme, put option, social security

Procedia PDF Downloads 95
166 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network

Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola

Abstract:

Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.

Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques

Procedia PDF Downloads 347